Automotive Vulnerability Detection System
نویسندگان
چکیده
In [1] we presented a Vulnerability Detection System (VDS) that can detect emergent vulnerabilities in complex Cyber Physical Systems (CPSs). It used the attacker’s point of view by collecting a target system’s vulnerability information from varied sources and populating an Attack Point (AP) database. From these APs, a Hierarchical Task Network (HTN) generated the set of composite device-level attack scenarios. The VDS used Alloy [2], a Satisfiability (SAT) planner to reduce the cardinality of the generated space by evaluating the feasibility of each attack. In [3], we specialized the VDS for the automobile domain. This paper further 1) specializes our prior research by submitting the generated prioritized list to an Automotive-specific Attack Evaluation Process (AAEP) and 2) enhances our prior research with a method to discover and test vulnerabilities by reverse engineering the actual binary code. With a combination of simulation and vehicle instrumented real-time execution, the AAEP confirms each candidate attack. The AAEP’s output is used as feedback to refine the SAT constraint model model. A novel part of AAEP is our Automated Reverse Engineering (ARE) system, which greatly reduces the search space for software bugs. The VDS is designed to support short product release cycles. A. Knowledge Acquisition
منابع مشابه
Poster: Physical-Layer Key Generation for Automotive Cyber-Physical System Security
Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for IntraVehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the s...
متن کاملSecurity Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the win...
متن کاملAn Unknown Input Observer for Fault Detection Based on Sliding Mode Observer in Electrical Steering Assist Systems
Steering assist system controls the force transfer behavior of the steering system and improves the steering probability of the vehicle. Moreover, it is an interface between the diver and vehicle. Fault detection in electrical assisted steering systems is a challenging problem due to frequently use of these systems. This paper addresses the fault detection and reconstruction in automotive elect...
متن کاملProtocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection
Starting from practical scenarios we underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, we outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks to less explored ones from the automotive indus...
متن کاملDealing with uncertainty in modern supply chains: vulnerability and risk management
The financial crisis has clearly shown the vulnerability of our global economy. New innovative tools are therefore needed to improve supply chain management thus contributing to recover from the economy slowdown. In this work we have developed a stochastic model for the automotive supply chain, dealing with uncertainty, and supporting strategic and tactical decisionmaking. This model takes into...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016